The function call
-
The main aim of this work is to use a finite element method (FEM) based on Shi’s third-order shear deformation plate theory (TSDT) to study the dynamic response of sandwich plates subjected to consecutive blast loading. The sandwich plate has an auxetic honeycomb core and two different functionally graded materials (FGMs) skin layers (so-called h-FGS plates).
14p viyoko 01-10-2024 2 1 Download
-
Lecture Network programing: JAVA socket programming. This lesson provides students with content about: what is a socket; client-server applications; sockets working model; socket programming with TCP; sockets for server and client; Unix/Linux socket functional calls; socket-programming using TCP; client/server socket interaction - TCP; socket programming with UDP;... Please refer to the detailed content of the lecture!
26p codabach1016 03-05-2024 9 1 Download
-
In the present report, a novel concept of frequency response function (FRF) is introduced for piezoelectric beam. First, a model of Timoshenko beam bonded with a piezoelectric layer is established and used for deriving the conventional frequency response function acknowledged as mechanical frequency response function (MERF). Then, the output charge produced in the piezoelectric layer is calculated from the MFRF and therefore obtained frequency-dependent function is called electrical frequency response function (EFRF) for the integrated beam.
16p dianmotminh02 03-05-2024 5 1 Download
-
The major protein fraction in pearl millet is prolamin the alcohol soluble fraction called pennisetin. Researches on the factors affecting pennisetin extraction and on its functional properties are still very scant. In this paper, the effect of temperature, reducing agents (β-mercaptoethanol, dithiothreitol or sodium metabisulfite) and sodium hydroxide on pennisetin extraction was assessed.
7p mudbound 10-12-2021 12 2 Download
-
Backtracking Search Optimization Algorithm (BSA) is a new stochastic evolutionary algorithm and the aim of this paper is to introduce a hybrid approach combining the BSA and Quadratic approximation (QA), called HBSAfor solving unconstrained non-linear, non-differentiable optimization problems.
12p tohitohi 22-05-2020 19 1 Download
-
This paper presents a new penalty function called logarithmic penalty function (LPF) and examines the convergence of the proposed LPF method. Furthermore, the LaGrange multiplier for equality constrained optimization is derived based on the first-order necessary condition.
10p tohitohi 22-05-2020 13 0 Download
-
In the paper we present a method for finding the weight vector called stencil with the help of RBF interpolation. This stencil is the foundation for constructing meshless finite difference scheme for boundary value problems. The results of numerical experiments show that the numerical solution obtained by RBF-FD with the stencils generated by Gauss RBF interpolation is much more accurate then the solution obtained by FEM.
4p cumeo2425 02-07-2018 22 1 Download
-
The aim of the paper is to give a generalization of functional and multivalued dependencies in an information system. The definitions are established under the assumption that there are some similarity relations between values of attributes. By using the so-called generalized dependency matrices we develop a necessary and sufficient condition for an extension dependency to be hold. Besides, some computational examples are given for illustration too.
7p binhminhmuatrenngondoithonggio 09-06-2017 49 3 Download
-
This paper introduces a probabilistic relational database model, called PRDB, for representing and querying uncertain information of objects in practice. To develop the PRDB model, first, we represent the relational attribute value as a pair of probabilistic distributions on a set for modeling the possibility that the attribute can take one of the values of the set with a probability belonging to the interval which is inferred from the pair of probabilistic distributions
17p dieutringuyen 07-06-2017 35 1 Download
-
The main contents of this chapter include all of the following: Some definitions, sockets, byte ordering, address transformation, byte manipulation functions, information about remote host, socket system calls, connectionless iterative server.
44p tangtuy09 26-04-2016 28 2 Download
-
In chapter 7 we will explore one strategy bacteria employ to control the expression of their genes: by grouping functionally related genes together so they can be regulated together easily. Such a group of contiguous, coordinately controlled genes is called an operon.
49p tangtuy05 30-03-2016 56 2 Download
-
A matrix is a rectangular array of numbers. The numbers in the array are called the entries in the matrix. We use the capital letters to denote matrices such as A, B, C,... The size of matrix is described in terms of the number of rows and columns it contains.
25p lalala10 05-03-2016 45 1 Download
-
Lecture "Charter 5: C Functions" provides students with the knowledge: Introduction, program Modules in C, math library functions, functions, function definitions, function prototypes, function call stack and activation records,... Inviting you refer.
68p doinhugiobay_13 24-01-2016 64 3 Download
-
JavaScript, originally called LiveScript, was developed by Brendan Eich at Netscape in 1995 and was shipped with Netscape Navigator 2.0 beta releases. JavaScript is one of the 3 languages all web developers MUST learn. In this lecture, we will learn JavaScript and JavaScript in HTML. Inviting you to refer.
36p youcanletgo_02 07-01-2016 44 4 Download
-
Lecture Data Structures & Algorithms: Chapter 2 - Function & Recursion presented Function, the Concept Of Stack, the Sequence Of Execution During A Function Call, Parameter Passing & Call By Reference, Resolving Variable References, Recursion, Stack Overheads In Recursion, Writing A Recursive Function, Types Of Recursion.
35p hoahue91 24-07-2014 62 2 Download
-
We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing the random oracle by so called \cryptographic hash functions". The main result of this paper is a negative one: There exist signature and encryption schemes that are secure in the Random Oracle Model, but for which any implementation of the random oracle results in insecure schemes.
37p tai_lieu2014 11-04-2014 64 6 Download
-
OpenCV (Open Source Computer Vision Library: http://opencv.org) is an open-source BSD-licensed library that includes several hundreds of computer vision algorithms. The document describes the so-called OpenCV 2.x API, which is essentially a C++ API, as opposite to the C-based OpenCV 1.x API. The latter is described in opencv1x.pdf. OpenCV has a modular structure, which means that the package includes several shared or static libraries.
819p hongphuoc8912 05-08-2013 494 249 Download
-
Pointers and Strings the study of strings is useful to further tie in the relationship between pointers and arrays. It also makes it easy to illustrate how some of the standard C string functions can be implemented. Finally it illustrates how and when pointers can and should be passed to functions.
86p sakuraphuong 04-06-2013 65 4 Download
-
Functions are "the central objects of investigation" in most fields of modern mathematics. There are many ways to describe or represent a function. Some functions may be defined by a formula or algorithm that tells how to compute the output for a given input. Others are given by a picture, called the graph of the function.
92p sakuraphuong 04-06-2013 41 4 Download
-
Transfers control back to "calling" function For return type other than void, MUST havereturn statement Typically the LAST statement in function definition return statement optional for void functions.
41p sakuraphuong 29-05-2013 63 5 Download